Road Warriors: Beware of ‘Video Jacking’
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
Over the last month and a half, ThreatConnect has authored a number of blog posts pulling at strands of a nebulous Russian spiderweb of malicious infrastructure – one data pointRead More →
Scylex – “the next big thing” in terms of banking trojan. Threat-intel experts from Heimdal Security and the CSIS Security Group have uncovered a new banking trojan called Scylex, currently advertisedRead More →
Corporate cybercrime and information theft has become a very lucrative business for malware developers. Not only does it allow them to steal corporate secrets to sell to the highest bidder, but it canRead More →
“DiskFiltration” siphons data even when computers are disconnected from the Internet. Researchers have devised a new way to siphon data out of an infected computer even when it has been physicallyRead More →
Sławomir Jasek with research firm SecuRing is sounding an alarm over the growing number of Bluetooth devices used for keyless entry and mobile point-of-sales systems that are vulnerable to man-in-the-middleRead More →
The good news? Hacks are limited for now. The bad news? Hackers will get better. Security researchers are eager to poke holes in the chip-embedded credit and debit cards that haveRead More →
What do spies use to chat online? A terribly ugly Windows programme. At least, that’s what the Five Eyes intelligence alliance (made up of the US, UK, Australia, New Zealand andRead More →
“Off-path” attack means hackers can be anywhere with no man-in-the-middle needed. Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections between virtually any two partiesRead More →
The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of HP (Hewlett Packard) and decided to explain concepts of code review to mitigate the risk of thisRead More →
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence.Can finding zero-day vulnerabilities be as easy as crawling the Darkweb?Read More →
Vulnerability common to devices routing IPv6; Cisco offered partial fix in July. Juniper Networks has found and mostly patched a flaw in the way the firmware on its routers process IPv6Read More →
LAS VEGAS–Microsoft’s Windows 10 includes many innovative security features that are intended to help minimize risk and improve user experience. One such feature is Credential Guard, which aims to protectRead More →
The flaw, which allows a malicious website to extract user passwords, is made worse if a user is logged in with a Microsoft account. A previously disclosed flaw in WindowsRead More →
Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, whichRead More →
The security expert Salvador Mendoza demonstrated that is it easy to steal Samsung Pay tokens and reuse them to make fraudulent purchases. The security researcher Salvador Mendoza has discovered aRead More →
The new Trojan can be used to steal information and passwords from compromised computers. Symantec recently noticed that an Italian malware author called z3r0 is selling a new remote accessRead More →
With Russia already meddling in 2016, a ragtag group of obsessive tech experts is warning that stealing the ultimate prize in —victory on November 8— would be child’s play. WhenRead More →
I had never heard of ‘HawkEye Keylogger’ until I’ve read the following blog post from Trustwave. I’ve found the amount of features quite interesting and I was curious to haveRead More →
This week there has been a lot of news about a flaw in Windows that could be used by web sites to easily gain access to a visitor’s Windows login nameRead More →